0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (14)
  • R250 - R500 (89)
  • R500+ (1,357)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Managing Information System Security (Paperback): Maggie Nicol Managing Information System Security (Paperback)
Maggie Nicol
R1,083 Discovery Miles 10 830 Ships in 2 - 4 working days

The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors.

Multimedia Watermarking Techniques and Applications (Hardcover): Darko Kirovski Multimedia Watermarking Techniques and Applications (Hardcover)
Darko Kirovski
R3,741 Discovery Miles 37 410 Ships in 12 - 17 working days

Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is the definitive resource on the subject for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.

Atomic Transactions - In Concurrent and Distributed Systems (Paperback): Nancy A. Lynch, Michael Merritt, William E. Weihl,... Atomic Transactions - In Concurrent and Distributed Systems (Paperback)
Nancy A. Lynch, Michael Merritt, William E. Weihl, Alan Fekete
R2,924 Discovery Miles 29 240 Out of stock

This book develops a theory for transactions that provides practical solutions for system developers, focusing on the interface between the user and the database that executes transactions. Atomic transactions are a useful abstraction for programming concurrent and distributed data processing systems. Presents many important algorithms which provide maximum concurrency for transaction processing without sacrificing data integrity. The authors include a well-developed data processing case study to help readers understand transaction processing algorithms more clearly. The book offers conceptual tools for the design of new algorithms, and for devising variations on the familiar algorithms presented in the discussions. Whether your background is in the development of practical systems or formal methods, this book will offer you a new way to view distributed systems.

Cryptography for Developers 2016 (Paperback): Jose Estevez Cryptography for Developers 2016 (Paperback)
Jose Estevez
R834 Discovery Miles 8 340 Out of stock

Cryptography for Developers gives developers the practical cryptographic tools they need in their daily work. It also provides them the contextual knowledge to understand how these 21st-century cryptographic tools have been fashioned in response to theoretical and technological advances in mathematics and computers that rendered the paradigms of classic and late 20th-century cryptography obsolete. The book focuses on the recipes for algorithms most commonly deployed by developers in practical applications, without delving into the details of the mathematical theory underlying them. The technical presentation of each algorithm in code is accompanied by a narrative account of the algorithm's applications and historical development. Depending on the reader's interest level, Cryptography for Developers may be read in its entirety or in its thematic parts, either as a technical manual of algorithms or as an introductory survey of modern cryptography. The technical heart of Cryptography for Developers describes cryptographic algorithms in current use, explains how they work and how to use them, and provides abundant practical examples from the libraries of popular programming languages, including Ruby, Java, C, PHP, JavaScript, Python, and Perl. Software architect Jose Maria Estevez proceeds to demonstrate with plentiful examples the protocols for combining algorithms and the methods for solving cryptographic problems commonly encountered by developers. The narrative portion of the book surveys the development of classical cryptography from ancient Athens through World War II, the computerization of cryptography in the second half of the 20th century, the explosive growth and proliferation of modern cryptography since the turn of the 21st century, and the forecast for future cryptographic developments driven by quantum computing and other technological and social trends.

Encyclopedia of Cryptography and Security (Hardcover): Henk C.A. van Tilborg Encyclopedia of Cryptography and Security (Hardcover)
Henk C.A. van Tilborg
R11,085 Discovery Miles 110 850 Out of stock

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A--Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification Block ciphers and stream ciphers Computational issues Copy protection Cryptanalysis and security Cryptographic protocols Electronic payment and digital certificates Elliptic curve cryptography Factorization algorithms and primality tests Hash functions and MACs Historical systems Identity-based cryptography Implementation aspects for smart cards and standards Key management Multiparty computations like voting schemes Public key cryptography Quantum cryptography Secret sharing schemes Sequences Web security The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject.

Handbook of Digital Evidence - Reliable Forensic Computing (Hardcover): Peter Sommer Handbook of Digital Evidence - Reliable Forensic Computing (Hardcover)
Peter Sommer
R1,434 Discovery Miles 14 340 Out of stock

Digital evidence is increasingly critical in an age of widespread Internet use, consumer-based email, digital contracts, digital correspondence, digitized business processes and records and digitized government. One needs to prove what went wrong in or near a computer-- whether a major crime, a dispute about a failed contract to deliver goods or services, a minor dispute within a business, or just an accident that generates legal proceedings or an insurance claim. The challenge is how to capture that evidence in ways that meet the needs of the legal system and also convince judges and juries lacking computer expertise. The problems of "digital evidence" are not the exclusive preserve of elite cyber-sleuths chasing hackers across the Internet. Anyone who uses a computer, relies on computer data, designs computer systems, or advises those who do needs to understand where and how much evidence can be located, how it should be preserved free from contamination, how it may best be analyzed, and how to present it in statements, affidavits, and court. The "Handbook of Digital Evidence and Forensics" will provide coverage of: *some basic principles about forensic science--its obligations, disciplines, professional practices, etc. *the application and development of these principles to specific types of computer-derived evidence (such as documents, database records, data from disks and other storage media, and data intercepted in transmission) *specific procedures and techniques for safe acquisition, analysis and presentation of particular types of evidence *presentation skills for written and oral evidence

Security and Survivability - Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems (Hardcover, 2., ??Berarb.... Security and Survivability - Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems (Hardcover, 2., ??Berarb. A)
Roy H. Campbell, Prasad G. Naldurg
R2,049 Discovery Miles 20 490 Out of stock

Security and Survivability presents new research on the emerging discipline of design and analysis of security systems that are survivable. Such systems are designed to continue to provide verifiable security guarantees, and allow the system to degrade gracefully, even under threat or actual incidence of attack.

The book introduces a theory of recovery-oriented security and provides well-developed case studies that corroborate the utility of the theory, addressing privilege-escalation and Denial of Service (DoS) attacks. Using their automated verification methodology, the authors formally prove for the first time whether strategies such as selective filtering, strong authentication, and client puzzles actually reduce the vulnerability of a network to DoS attacks.

The HIPAA Compliance Kit - Understanding and Applying the Regulations in Psychotherapeutic Practice (CD-ROM, 3rd Revised... The HIPAA Compliance Kit - Understanding and Applying the Regulations in Psychotherapeutic Practice (CD-ROM, 3rd Revised edition)
Ofer Zur
R1,551 R1,458 Discovery Miles 14 580 Save R93 (6%) Out of stock

New medical privacy rules (HIPAA) are having a profound impact on all medical practices. In an easy-to-follow Q&A format based on his sold-out courses, Ofer Zur addresses over one hundred questions about these often-confusing regulations, including: What are the basic requirements for compliance? How is therapist-patient privacy protected? Do managed care companies have a right to review my notes? Can I say the name of my patient in my waiting room? What do I need to know regarding my phone?A CD-ROM is included, providing you with simple checklists and ready-to-apply HIPAA forms that you will be able to personalist and utilize in your practice.

Management of Information Security (Paperback, 5th edition): Herbert Mattord, Michael Whitman Management of Information Security (Paperback, 5th edition)
Herbert Mattord, Michael Whitman
R1,354 R1,257 Discovery Miles 12 570 Save R97 (7%) Special order

Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging content prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks, and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. This edition offers a tightened focus on key executive and managerial aspects of information security while still emphasizing the foundational material to reinforce key concepts. Updated content reflects the most recent developments in the field, including NIST, ISO, and security governance.

Software Security Technologies (Paperback, New edition): Richard Sinn Software Security Technologies (Paperback, New edition)
Richard Sinn
R1,738 R1,584 Discovery Miles 15 840 Save R154 (9%) Special order

Providing the perfect blend of basic security theory and practical software security programming, Software Security Technologies: A Programmatic Approach offers a valuable introduction to the field of software security. Divided into three parts, this comprehensive guide encourages readers to master their security skills by building on the basics. The first section of the book is devoted to fundamental security theories that govern common software security technical issues. Coverage then progresses to a focus on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. Using these theories and programming practices as a foundation, the book concludes with a section on security in practice, demonstrating how the conceptual and practical materials covered in the first two sections are applied in real-world scenarios. All of these topics are explained using a straightforward approach, so that readers can grasp the information quickly and easily, gaining the confidence they need to further develop their skills in software security technologies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Countdown 1960 - The Behind-The-Scenes…
Chris Wallace, Mitch Weiss Hardcover R817 R661 Discovery Miles 6 610
Characteristics of Distributed-Parameter…
A.G. Butkovskii, L.M. Pustyl'nikov Hardcover R3,315 Discovery Miles 33 150
Baseball in New Haven
Sam Rubin Hardcover R781 R686 Discovery Miles 6 860
Irish Migrants in New Communities…
Micheal O'hAodha, Mairtin O. Cathain Hardcover R2,476 Discovery Miles 24 760
Key Technologies of Intelligentized…
Yiming Huang, Shan-Ben Chen Hardcover R2,873 Discovery Miles 28 730
The Future Of Geography - How Power And…
Tim Marshall Paperback R380 R300 Discovery Miles 3 000
In Pursuit of Technological Excellence…
Ernst G. Frankel Hardcover R2,208 Discovery Miles 22 080
Manual on the Human Rights to Safe…
Robert Bos Paperback R2,267 Discovery Miles 22 670
Portfolio and Investment Analysis with…
John B. Guerard, Ziwei Wang, … Hardcover R2,395 Discovery Miles 23 950
Friction Stir Welding - Dissimilar…
Noor Zaman Khan, Arshad Noor Siddiquee, … Hardcover R5,161 Discovery Miles 51 610

 

Partners